« List of all packages

rawlink

Opam page: https://opam.ocaml.org/packages/rawlink/

Versions

Version
rawlink.2.1 (latest)
rawlink.1.2
rawlink.1.0

Vulnerable external dependencies (36897)

Product For package Vendor Severity CVE Published
linux-headers rawlink.2.1 Linux Unknown CVE-2023-53588 - wifi: mac80211: check for station first in client probe 10/4/2025
linux-headers rawlink.1.0 Linux Unknown CVE-2023-53588 - wifi: mac80211: check for station first in client probe 10/4/2025
linux-headers rawlink.1.2 Linux Unknown CVE-2023-53588 - wifi: mac80211: check for station first in client probe 10/4/2025
linux-headers rawlink.2.1 Linux Unknown CVE-2023-53587 - ring-buffer: Sync IRQ works before buffer destruction 10/4/2025
linux-headers rawlink.1.0 Linux Unknown CVE-2023-53587 - ring-buffer: Sync IRQ works before buffer destruction 10/4/2025
linux-headers rawlink.1.2 Linux Unknown CVE-2023-53587 - ring-buffer: Sync IRQ works before buffer destruction 10/4/2025
linux-headers rawlink.1.0 Linux Unknown CVE-2023-53586 - scsi: target: Fix multiple LUN_RESET handling 10/4/2025
linux-headers rawlink.1.2 Linux Unknown CVE-2023-53586 - scsi: target: Fix multiple LUN_RESET handling 10/4/2025
linux-headers rawlink.2.1 Linux Unknown CVE-2023-53586 - scsi: target: Fix multiple LUN_RESET handling 10/4/2025
linux-headers rawlink.1.2 Linux Unknown CVE-2023-53585 - bpf: reject unhashed sockets in bpf_sk_assign 10/4/2025
linux-headers rawlink.1.0 Linux Unknown CVE-2023-53585 - bpf: reject unhashed sockets in bpf_sk_assign 10/4/2025
linux-headers rawlink.2.1 Linux Unknown CVE-2023-53585 - bpf: reject unhashed sockets in bpf_sk_assign 10/4/2025
linux-headers rawlink.1.2 Linux Unknown CVE-2023-53584 - ubifs: ubifs_releasepage: Remove ubifs_assert(0) to valid this process 10/4/2025
linux-headers rawlink.2.1 Linux Unknown CVE-2023-53584 - ubifs: ubifs_releasepage: Remove ubifs_assert(0) to valid this process 10/4/2025
linux-headers rawlink.1.0 Linux Unknown CVE-2023-53584 - ubifs: ubifs_releasepage: Remove ubifs_assert(0) to valid this process 10/4/2025
linux-headers rawlink.1.2 Linux Unknown CVE-2023-53583 - perf: RISC-V: Remove PERF_HES_STOPPED flag checking in riscv_pmu_start() 10/4/2025
linux-headers rawlink.1.0 Linux Unknown CVE-2023-53583 - perf: RISC-V: Remove PERF_HES_STOPPED flag checking in riscv_pmu_start() 10/4/2025
linux-headers rawlink.2.1 Linux Unknown CVE-2023-53583 - perf: RISC-V: Remove PERF_HES_STOPPED flag checking in riscv_pmu_start() 10/4/2025
linux-headers rawlink.2.1 Linux Unknown CVE-2023-53582 - wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds 10/4/2025
linux-headers rawlink.1.0 Linux Unknown CVE-2023-53582 - wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds 10/4/2025